Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 15:58
Static task
static1
Behavioral task
behavioral1
Sample
de76e8499d2ea9cd3276b66e19b7aa59_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de76e8499d2ea9cd3276b66e19b7aa59_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de76e8499d2ea9cd3276b66e19b7aa59_JaffaCakes118.html
-
Size
46KB
-
MD5
de76e8499d2ea9cd3276b66e19b7aa59
-
SHA1
24720897b35f1a27ffdbfff0dc1089a255a27b83
-
SHA256
d75e493e422fe50e0ee5fbc16c6eaacd2b646565f0c2f24a3c317e0f3ac5ced9
-
SHA512
f51e00bca1e54c9207f6e131bd2bf19dd3e15d79a4be4d0b2718de7d2b31eab596a38723827ceadb5d8967668839f2fa1fb4f2955412c406e2e2c81272554ab8
-
SSDEEP
768:v/vneuu03pSmwwNb6axuxSLUV/2xHnwMZnO:v/vRSIsa7LUV2xHnllO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432404950" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4A69561-71E8-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3020 2172 iexplore.exe 30 PID 2172 wrote to memory of 3020 2172 iexplore.exe 30 PID 2172 wrote to memory of 3020 2172 iexplore.exe 30 PID 2172 wrote to memory of 3020 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de76e8499d2ea9cd3276b66e19b7aa59_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD524dc039824fc60e8ad2e8f37aceed45b
SHA1d17922ad498197ebbca2a97217310962dd101a31
SHA25655bd033fa8701348db114571a46260227d67fe543cae511eaf9e5c5efeac6064
SHA5124ba169617449b7bf1e6e24096dd0c00aa01f4704aaa0341cb43e802b3da0e1aae7ba9bb8aaeca053dc82ed66da532be2f948492fcec864a64de85c0938959eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224282b3fc14c02710256290a100432f
SHA1501bcea25a6df6212b8eeec128570f2594cf9d0e
SHA25611bb539317c7c789a3c4d55cd46f26a25531272012b8af728db91b9fd9ad1d2b
SHA5124ef8fb5ac367485594d343ff227a18ce3abcf1e08fffbd1781cdf767a6cf21077b533a45b79e59de59f0b51fa142be6aa15461449d3a5677c9b26279ad79f2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25f136332f85130cf698439488cb509
SHA1426e2bc28c0c709cfbbacacd43915827acc64abf
SHA2564207a7a99767cc535f01f9f519728cdd509c1116494f3e57e2054ef504689cec
SHA51276c1791e43583b906bc265245cf44c2ffd5a31c674037844e509358788fb715f415da174c219be1e481ce352411ef0387d4b60429258706908d88aa3d790bff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d45f2a90beb750020a3a73f191e6e981
SHA14e12b4deb7342b3254330aaccf8784af9c24bfa6
SHA256e9633d6d2454d17727404d29a0a1cb22e20077065c55d4c29f95531d6b1a8fc7
SHA5129703f14aaedc5abf44868ec7386e441ab20dc94e3e1f2534d574ead21ffdc1515d5a49d11c7aef7ca845a135447407d539c597ab2b6dae822c62b3fc492c46da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa34913cb89eca70d890241c06596883
SHA15649248ddab14d05327cc59467648609711ef653
SHA2562b9aa25aa5dd2f668336d616793ef7a8d50aed490b599227a83fe457f8f7a54a
SHA51236950c7a3e4669ff17a925b2704da1730e74f9f1a1b0951aedd4500a4a82655199678b0d062f406a8813b48da9492f7a0855399a0bd169c029353c171a790593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51386023b2fa382df918ee351a6ac5f53
SHA1ff0419835f2d56213f9d5d1391c51904235468b5
SHA256b30ae1412b6d2d75fc320d3e955ce22c5474e850f93d271ed808ad8d7d26a46e
SHA512c1285103553be0ceb9f7bbc4c5046ccc8631747c2fd0b891b04fe2335461b3e00353a19436ebc35b81aeeb3c10048811f798f5fe9ca67a3cb4377591a4d159e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285f162833a5267050361c6951f5d468
SHA1d4d35c24d65db204cbb3ea4e65f7d312ee93a1cb
SHA25601de5041ad22e37e7c985e2c343b2b9b040a22db7fbae4ae3c905fa31d4ce0ab
SHA51291910b174c40240e0ce4c866be4d6a741857e40ef3dad6ad3aaa03d4a6209561d7624c4bf57b31d372be67f459bee9bfe688e577a98c484e520d9d26f840b724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571065c1166c094efe67db459fa7dd58e
SHA129a87d163c3dcfb278e41707b883a6246cc74250
SHA25680137b6a65214a6784427c92526887b171801238d2e715ee8de69624ad815a1d
SHA51213939e26f9391286dd990518ba9b5e4e46a9113b0b98c7983586b3aee21482d89abc78a81917a958c21e2ebbcbfb00168dbc28aaf2430f1c2a4a21dbca1dd7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4173b725189a0a2eb3928db659e1f88
SHA18a697d7894801d989c5351b700d4f4e526c19fe6
SHA256421e98c7c99d9745a12c1ce92347985882b69c1eb644008f3b9faeaf176e1ac2
SHA512b07130bbf1d4c32a42400ed0bc4b498df9889379745875b561ffcbb54e36e43f07845b5f8a24d421be325fc7f09fb7d1a74b83a573b9e717cee459ff31b8953d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2090a857b4ddf764f4661d89f507de1
SHA1dd9f2c11bcb59002b54441383e76ebbc1eff949f
SHA256209c4486e28d195d84daf188df17f0054b19a88efc99735a868218e9a9b0d03f
SHA512f4baa6360092f7aeeb803f8d5d152808b3972aaf9f10cc3156333f3e1b1af5d8529b8d23f106f848a61d912178f84513a47a9eea1f006896dfe520cec5372385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2eac580cadf42b001031788b762d8d7
SHA13d535237b2e996e7ad6cf323c076810a92c6b920
SHA256c622e1c0acf45ea17811776d2d1d63e1ac1be511fdf62900ac88064f3609adb1
SHA512d0e8922dce65818dc2d68acfd571712ca15bebb39857bbff0bd9d89e2015bc5e1deaaa9c3465091c482e4eebe3011f45006ffb5c5183da2a968725f29ad3ecd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd0f558a102b72d0aa47f1ef658aaa2
SHA1d4f74e9b4637d48bb05ee74251e7255ed4fe2b9e
SHA256c44bdc7b02bb277248bac99a210f13f002480d9e517f3b5696e0d03507ffe4cc
SHA512348b2e2fd3c7d661a60e649761b5b7584b8731a3e34b3d22377d8e8cc78cf973b328113e9fc195cb27845e3d48a692d4dd7129f75823b9751047bfb230b6082b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5494f8e8f05431226f2c708e2398183
SHA14b3bfef84637333ba219aee7155e9c25b8de9fbb
SHA256080f525528f1be16ab2a94694bb15ea3f064a148bb98cf294e7d9330ecbe7822
SHA51285565332ffbe8c95b27f3c2f126bf9b1f82fa8f3c9f856811b04c32282c2d60d488b5602c55540ed9f694796786d42ed02268f8ef63fdaf567d20f147a00094b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52136ce13ad6447ecbcf743046a9efe3d
SHA13ba6a913d6e6d7054881b9094fb27befe710032a
SHA256cb00a196f05a65f9dfb2f3deb12cdf91aa9a3c2a5520f7aa55ce3b0381b9cedf
SHA512af398cc2ecf4df3c0b56d9e83067a338c883ae9a89447e2015681217ce473f381d2c41fc5bb70d15200b4b2b84f428cc132de32536c7b0270d39d5bf18eac9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd33799cd2b181a49153a8a4184b80fd
SHA19b5e6aba91b230e9b9abd8c2388fdae99330e164
SHA2569313490f987ead48090f9705159f24891d6c84d08efd915a67d2dde5172e7944
SHA5123ef18b423dc6dbc7a46ce9a9dc85874e4d7ecd0148e0c8c9d50673a03e2b30879004564b0231b2f4c65310c1734623014d0366277300a13be8fffb26ea32adec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6fef49d61da6141710f4768baf20b76
SHA1c15651299b706dd661b8e06244ffcc37f74c131e
SHA256a4a894455bea7c03de723120fe445d2f468a23febac8fad6559f6fd779be0873
SHA5120cc88d6547fa5d271c2b9a2a56048f8d56568944dd5701d897b8fa76e3361e63204144c694766b8cc8eb6b5294b87f7d2ae237874eb79f88b42a6b47e7e1ada4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91e09c3e345945169d117be3498a0ae
SHA176c107d0a11661c1fbec781f104ff71fefb1bd01
SHA2560019d4200283f271b0171534e0fabb2531a851b2ab4f3a412a32ff5eef739e26
SHA512d694e2caceaa676e39c44ae762a6e3b6d375108f41202e4e2aaa2ca318de1dd5a4cc9ef2566501f99163667273a8002b49dcc29bb5114176383eb6ae5f1a2a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55679f5b284fc154b1b4f82baef4bd9ee
SHA1b2c118f9c75ebaca8aef01673c01aa92b2e2826b
SHA2560fc4fefa8e5d032d5b0b84121efc212a59f6d9d1aa7295617829eb2b7a52b4fc
SHA512e74b35b5a63fe9e1b9645031c531f962bf03a6e6de0ee9f930101094b5886819961200291db4e4fdd0f92848a158634d1fc74ba8e65539b729b6bb0fb49c0756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ff00a2d1a90b316045d8bd987e190e
SHA1e71d65d34736a64e2c4edd55de6f0aa9be1a3946
SHA256f809b04e0fb9ba5274ae4f4a40804b350a076ad8a9f2856193398c3c1e746a92
SHA5124c923c8c739470a54a7c9e5b17518f683512482725fcb7f66d528532ad0b2cdf8d0889eb094e38a48433ce1959572be1e1026f0b3aff9bce10a4347d94a32601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD554fe652d9026bb171f06eaa73b26bb42
SHA163a6c6fed089ea4539dff227ede8198138549964
SHA256499e8772acd0acc31d3172eb8f901c463e1a60726dd34191b73be511586a3a18
SHA512043f962ba23ca150ef533c72b4f94c0c0d5e1497031e1e39fbe54d9072d1b9bb2c7c5263683535cd8cb229fcbdf711311a21dccbcd56347f7e97ac403f9b606b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0E1IWGZ4\412[1].htm
Filesize179B
MD52e80ba8bff71b4ebd5dd91a33801ec28
SHA1890ebf3f1d92bd251109723245c3c2c91654f04b
SHA256e229871f7c4a5d8d85827f811549a3e72246c75a5580b80084795794655741d8
SHA512bb64a50c727fd050ff1b4f61952ecf7e3392fb13fe9a55c8bc52d7fc681850cc32ee44fb2a9d5cab2742130048eca3f8b189d5489e511b26096d5074f827e170
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b